UNIX System Services (USS) Agenda

Total Page:16

File Type:pdf, Size:1020Kb

UNIX System Services (USS) Agenda Everything you wanted to know about mainframe security, pen testing and vulnerability scanning .. But were too afraid to ask! Mark Wilson [email protected] Session Details: UNIX System Services (USS) Agenda • Introduction • Objectives • What is UNIX? • What is z/OS UNIX aka USS? • How do you do USS Security it properly? • Summary • References • Questions INTRODUCTION Full Day Workshop Session ????? Introduction • Mark Wilson – Technical Director at RSM Partners – I am a mainframe technician with some knowledge of Mainframe Security – I have been doing this for over 30 years (34 to be precise J) – This is part four of seven one hour long sessions on mainframe security – Full details can be seen on the New Era Website: • http://www.newera-info.com/MF-SEC.html This is where Mark Lives! My passions outside of work? • One wife and three daughters…..enough said…..don't have anytime or money for anything else….or so they tell me J • Motorbikes – www.wilson-mark.co.uk • Football – www.wba.co.uk • Scuba Diving – Way too many links to list here…..But I have been and dived here – http://en.wikipedia.org/wiki/Chuuk_Lagoon OBJECTIVES Full Day Workshop Session ????? Objectives • Slightly different session this month as this is its not about hacking • This session is all about doing z/OS USS Security Properly • We will start with an overview of UNIX and USS • We will then look at the things we need to do, so that we do USS security properly WHAT IS UNIX? Full Day Workshop Session ????? UNIX History • UNIX is an OPEN SYSTEM – Following a set of Standards – Allowing multiple vendors – Allowing multiple systems – Providing Interoperability and Portability – Will run on any type of terminal • Developed at Bell Labs in late 1960’s • Initially called MULTICS - MULTiplexed Information and Computing Service • Implemented on PDP-7 • Command interpreter interface (shell) Birth Of UNIX • AT&T began work on its own idea of the system: – Ken Thompson and Dennis Ritchie researchers – Scaled down version referred to as UNICS (UNiplexed Information and Computing System – Brian Kernighan suggested the name UNIX for new system The Original Programmers Dennis Ritchie and Ken Thompson working at the PDP-11. UNIX Components Hardware Kernel Shell & Utilities Applications OPERATING SYSTEM Hierarchical File System (HFS) DIRECTORY / - Root DIRECTORY DIRECTORY DIRECTORY DIRECTORY DIRECTORY FILE FILE FILE FILE FILE FILE FILE FILE FILE FILE FILE FILE Hierarchical File System (HFS) • Search through directories to find files • Files are named by specifying directories in path plus file name /dir1/dir3/MyData • Users usually specify the current working directory to eliminate having to specify complete path • Users must have EXECUTE authority to the path in order to access a file UNIX Security • UID identifies user, its just a number • GID identifies group to which user belongs, its just a number • Access rights determined by – UID - if user is owner of file UID 0 – GID - if user is in group that owns file – Other - if neither UID nor gID match UNIX File Security Packet File Mode File Permission Bits File File S Owner Group Other Auditing Set Set t Owner Owner UID GID UID Group i GID c Extended Attributes k r w x r w x r w x y p a s WHAT IS Z/OS UNIX AKA USS Full Day Workshop Session ????? Open Systems on z servers z/OS Workstation z/OS SERVICES z/OS UNIX LOCAL FILES APPLICATIONS COMPONENTS MVS DATASETS HFS DATASETS What is z/OS UNIX? • Up to OS/390 2.5 known as OpenEdition MVS • With OS/390 2.6 known as OS/390 UNIX System Services • Base element of z/OS • Has the look and feel of UNIX because it is UNIX • Enables two open systems interfaces – An application program interface (API) – An interactive z/OS shell interface What is z/OS UNIX? • API’s Programs can run in almost any environment: – Batch – TSO via OMVS – As Started Tasks • Programs can request: – Only MVS services – Only z/OS UNIX – Both MVS and z/OS UNIX • SHELL Interface is an execution environment – Programs run by shell users – Shell commands and scripts run by shell users – Shell commands and scripts run as batch jobs What is z/OS UNIX Used For? • Makes application development easier – Standard (open) programming interface – Interoperability in networks – Portable programs – Portable data • Required by some products – TCP/IP – FTP – LDAP – Plus many others!! Components of z/OS UNIX • KERNEL - Low-level system code • SHELL - A command processor • FILE SYSTEM - Hierarchical File System (HFS) – Directories – Files • DAEMONS - Processes that run in background i.e. Started Tasks • COMMUNICATION SERVICES - Methods of access – TSO/E – VTAM – TCP/IP UNIX Kernel • Manages memory • Schedules work • Controls machine data • Executes shell instructions • Enforces security UNIX Shell • UNIX Shell – interprets commands – runs program requested – coordinates activity between you and operating system • Common shells in use: – bourne SHell - sh – C SHell - csh – TC SHell - tcsh – Korn SHell - ksh – Bourne Again SHell - bash Hierarchical File System (HFS) • File system is contained in z/OS dataset(s) • Data sets can be SMS managed or non-SMS managed • Additional file systems can be mounted • Only a superuser can MOUNT or UNMOUNT a file system • Security is handled by the SAF security interface on z/OS • External security system needed for security of the file system Hierarchical File System in z/OS • Location for all data accessed by z/OS UNIX • Can copy files between z/OS and HFS via TSO/ISPF panels • Primary issue is long path-oriented names (like personal computer DOS names) and UNIX's mixed-case file names File System Mount Points • Additional file systems can be mounted – HFS - Hierarchical file system – zFS - zSeries file system – TFS - temporary (or toy) file system – DFS - distributed file system Root File System – NFS - network file system D1 D2 HFS Data Set D3 F F D4 D3 D4 HFS Data Sets F F F F F F z/OS UNIX Security Functions • User Validation – UID, GID • File Access Checking – File Security Packet (FSP) containing File Permission Bits and now ACLS • Auditing – FSP, File Audit Bits – RACF Systemwide Options – UNIXPRIV and FACILITY Classes • Security Administration – RACF and UNIX Commands z/OS UNIX File Security Packet File Mode File Permission Bits Auditing Options File RACF File File S Owner Group Other Set Set t Owner AUDITOR Owner Owner UID GID UID Group i GID c Extended Attributes k r w x r w x r w x y p a s HOW DO YOU DO USS SECURITY IT PROPERLY? Full Day Workshop Session ????? How do you do it properly? • You need a plan • You need an owner for USS security – And it should NOT BE the z/OS system programmers – USS security should be owned by the security groups within your organisation • Security Engineering • Security Administration • Risk & Compliance • Audit SOME RULES OF THE ROAD Full Day Workshop Session ????? UID Assignment • You need a plan for: – Normal/Real Users….could use employee/staff number if unique – Started Tasks – Break glass Users (Emergency Users) – Superusers • UID(0), Access to BPX.SUPERUSER, Trusted and Privileged – You may have to remediate the current system to align to the plan as stuff was just assigned previously gID Assignment • You need a plan for: – Default groups – Access Control groups – Owning groups – All of the other types of groups you may have! • Even if the plan simply states that a gID should not be defined BPX.DEFAULT.USER • Think enough has been said about this • Just get off it ASAP • z/OS 1.13 is the last release to support this profile • There is lots of reference material out there for how this can be done HFS & ZFS Security • Created as VSAM Linear Datasets • Use strict access control using RACF, ACF2 or TSS • In a RACF environment suggest a fully qualified generic dataset profile • No normal users need any access to these VSAM datasets – Only the creator and the userid used for backing them up • Never make the HLQ the same as a real RACF Userid Some File and Directory Ownership • You need a plan, just like we do for ownership of z/OS data • Data needs to be classified so that it can be secured and audited correctly • Ownership of USS files and Directories needs to bee factored into your wider Joiner, Mover, Leaver (JML) process • You need a regular monitoring report that shows unowned files and directories (BPXBATCH with –nouser and –nogroup is a good start) • Consider creating some none personal userids and specific groups to own files and directories Access Control Lists • There are some good things about ACLs….. – Default file and directory security supported – Gets around the one UID & GID limit of the FSP • But there are some bad things too….. – Not POSIX compliant – Security information is not transported to NON z/OS systems as they don’t understand them – Performance can be an issue – And many others…… • So if you need to use them do it after careful review and debate and their use should be an exception not the NORM! Key Files & Directories • There are key z/OS Unix files and directories that must be secured and the security policy should state the most important ones • It Should dictate the settings for the file and directory FSP • Key directories: – / (root) Holds all mount points – /bin Core programs, many APF or Program Controlled – /dev Holds many files used during IPL and Shell login – /etc Many key config files held here – /tmp All users need write access – /var Many services need write access Key Files & Directories • Key files: – /etc/rc • run commands executes at IPL time with UID(0) privilege – /etc/init.options • kernel control file
Recommended publications
  • RICOH Web Enablement Solutions Suite
    RICOH Web Enablement Solutions Suite Transform print centric data streams into web-optimized, user-friendly content. Let customers take their information to go. For as long as businesses have existed, there has been important information for them to Benefits communicate to their customers. • Transforms documents for optimal In today’s information-rich age, the need for businesses to web use while maintaining fidelity. accurately, quickly communicate has never been greater. In today’s on-the-go, cost and environment conscious world, • Empowers on-the-go users to paper documents – which are often looked at just once and then access crucial information where, filed or thrown away – can seem inconvenient and antiquated. when and how they need it. • Puts help desk and customers on The RICOH Web Enablement Solutions Suite, which is the same page (literally) by helping comprised of a set of complementary products, helps to to ensure both parties see the transform print-centric data streams into web-ready same document in the exact same documents with utmost fidelity. way, aiding troubleshooting. Products Include: • RICOH Line2PDF Plus • RICOH PS2PDF and RICOH PCL2PD • RICOH AFP Merge • RICOH AFP Visual Environment • RICOH AFP2PDF Plus • RICOH TIFF2PDF Plus 2 To better understand how this is accomplished, take a closer look at the component solutions. RICOH Line2PDF Plus RICOH AFP2PDF Plus Line data documents can be extremely simplistic. Paper documents still have their advantages. They However, when it comes to customer communications, can easily be handed off. They can be marked up you often want to show a little more visual acumen, without any special expertise.
    [Show full text]
  • Introducing Z/Os Unix System Services
    Contact Us [email protected] HOME > COURSE CATALOG > IBM > IBM Z/OS > INTRODUCING Z/OS UNIX SYSTEM SERVICES Introducing z/OS UNIX System Services DURATION 20 Hours RATING COURSE OP05GFR AVAILABLE FORMATS Classroom Training, Online Training BADGES & CERTIFICATIONS LearnQuest IBM z/OS UNIX System Services Foundations Course Description Overview This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. This is an introductory level course. It provides an overview of z/OS UNIX System Services (usually abbreviated to z/OS UNIX) as seen by the user. Details of installation and implementation for system programmers are not covered in this course. Objectives 9/26/2021 1 of 3 10:29:38 AM Discuss the role of z/OS in an open systems environment Identify the basic terms used in z/OS UNIX Define the components of z/OS UNIX Explain major functions provided in z/OS UNIX Discuss opportunities for applications in a z/OS UNIX environment Identify z/OS base elements and optional features that make up z/OS UNIX Use the two interactive interfaces available to access the services Audience This intermediate course is for all computer professionals who will use z/OS UNIX. Prerequisites You should have a basic knowledge of z/OS equivalent to the course An Introduction to the z/OS Environment (ES05G). Topics Day 1 Welcome and introduction Unit 1. z/OS UNIX overview Unit 2. Introduction to z/OS UNIX Unit 3.
    [Show full text]
  • Unix System Software
    Unix system software Unix is a family of multitasking, multiuser computer operating systems that derive from the . modifiable source code for all of these components, in addition to the kernel of an operating system, Unix was a self-contained software n in​: ​C​ and ​assembly language. This sets Unix apart from proprietary operating systems like Microsoft Windows. system Solaris 10 integrates the most popular open source software and. UNIX is a multitasking operating system developed at Bell Labs in the early s. It was designed to be a small, flexible system used by programmers. APIs are changing more than just software architectures. From planning through. Today, without UNIX systems, the Internet would come to a screeching halt. Their new organization was called the Open Software Foundation (OSF). By operating system, we mean the suite of programs which make the computer UNIX systems also have a graphical user interface (GUI) similar to Microsoft. Unix also was developed as a self-contained software system, comprising the operating system, development environment, utilities. An operating system is the program that controls all the other parts of a computer system, both the hardware and the software. It allocates the computer's. Unix. In , Kenneth Thompson, Dennis Ritchie, and others at AT&T Bell Labs began developing a small operating system on a little-used PDP By the most simple definition, UNIX is a computer operating system - the base software that controls a computer system and its peripherals. The Difference Between UNIX and LINUX Operating Systems With Examples You may have Unix is a proprietary software operating system.
    [Show full text]
  • UNIX System Services Z/OS Version 1 Release 7 Implementation
    Front cover UNIX System Services z/OS Version 1 Release 7 Implementation z/OS UNIX overview z/OS UNIX setup z/OS UNIX usage Paul Rogers Theodore Antoff Patrick Bruinsma Paul-Robert Hering Lutz Kühner Neil O’Connor Lívio Sousa ibm.com/redbooks International Technical Support Organization UNIX System Services z/OS Version 1 Release 7 Implementation March 2006 SG24-7035-01 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. Second Edition (March 2006) This edition applies to Version 1 Release 7 of z/OS (5637-A01), and Version 1, Release 7 of z/OS.e (5655-G52), and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2003, 2006. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xiii Trademarks . xiv Preface . .xv The team that wrote this redbook. .xv Become a published author . xvi Comments welcome. xvii Chapter 1. UNIX overview. 1 1.1 UNIX fundamentals . 2 1.1.1 UNIX objectives . 2 1.1.2 What people like about UNIX . 2 1.1.3 What people don’t like about UNIX . 3 1.1.4 UNIX operating system . 3 1.1.5 UNIX file system . 4 1.1.6 Parameter files . 6 1.1.7 Daemons. 6 1.1.8 Accessing UNIX . 6 1.1.9 UNIX standards. 7 1.1.10 MVS and UNIX functional comparison . 8 1.2 z/OS UNIX System Services fundamentals .
    [Show full text]
  • MTS on Wikipedia Snapshot Taken 9 January 2011
    MTS on Wikipedia Snapshot taken 9 January 2011 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sun, 09 Jan 2011 13:08:01 UTC Contents Articles Michigan Terminal System 1 MTS system architecture 17 IBM System/360 Model 67 40 MAD programming language 46 UBC PLUS 55 Micro DBMS 57 Bruce Arden 58 Bernard Galler 59 TSS/360 60 References Article Sources and Contributors 64 Image Sources, Licenses and Contributors 65 Article Licenses License 66 Michigan Terminal System 1 Michigan Terminal System The MTS welcome screen as seen through a 3270 terminal emulator. Company / developer University of Michigan and 7 other universities in the U.S., Canada, and the UK Programmed in various languages, mostly 360/370 Assembler Working state Historic Initial release 1967 Latest stable release 6.0 / 1988 (final) Available language(s) English Available programming Assembler, FORTRAN, PL/I, PLUS, ALGOL W, Pascal, C, LISP, SNOBOL4, COBOL, PL360, languages(s) MAD/I, GOM (Good Old Mad), APL, and many more Supported platforms IBM S/360-67, IBM S/370 and successors History of IBM mainframe operating systems On early mainframe computers: • GM OS & GM-NAA I/O 1955 • BESYS 1957 • UMES 1958 • SOS 1959 • IBSYS 1960 • CTSS 1961 On S/360 and successors: • BOS/360 1965 • TOS/360 1965 • TSS/360 1967 • MTS 1967 • ORVYL 1967 • MUSIC 1972 • MUSIC/SP 1985 • DOS/360 and successors 1966 • DOS/VS 1972 • DOS/VSE 1980s • VSE/SP late 1980s • VSE/ESA 1991 • z/VSE 2005 Michigan Terminal System 2 • OS/360 and successors
    [Show full text]
  • On Z/OS and OS/390 UNIX
    C/C++ Applications on z/OS and OS/390 UNIX Port UNIX C/C++ applications to z/OS Write portable C/C++ applications Real-world port described Michael MacIsaac Ralph Best Johan Koppernaes Ka Yin Lam Raymond Mak Daniel Prevost George Reid ibm.com/redbooks International Technical Support Organization C/C++ Applications on z/OS and OS/390 UNIX December 2001 SG24-5992-01 Take Note! Before using this information and the product it supports, be sure to read the general information in “Special notices” on page 205. Second Edition (December 2001) This edition applies to version 1, release 2 of z/OS and earlier releases of OS/390, program number 5647-A01. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. HYJ Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 2000, 2001. All rights reserved. Note to U.S Government Users - Documentation related to restricted rights - Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Contents . iii Preface . ix The team that wrote this redbook. ix Special notice. .x IBM trademarks . xi Comments welcome. xi Summary of changes. xiii December 2001, Second Edition . xiii Chapter 1. z/OS and OS/390 tools . 1 1.1 User access under z/OS . 2 1.1.1 JCL and batch. 2 1.1.2 JOB statement .
    [Show full text]
  • Case: 3:21-Cv-00031 Document #: 1 Filed: 03/31/21 Page 1 of 57
    Case: 3:21-cv-00031 Document #: 1 Filed: 03/31/21 Page 1 of 57 lIN THE DISTRICT COURT OF THE VIRGIN ISLANDS DIVISION OF ST. THOMAS AND ST. JOHN XINUOS, INC., ) ) Plaintiff, ) Civil Action No. __________ ) v. ) ) JURY TRIAL DEMANDED INTERNATIONAL BUSINESS ) MACHINES CORP. and RED HAT, ) INC. ) ) Defendants. ) ) COMPLAINT Case: 3:21-cv-00031 Document #: 1 Filed: 03/31/21 Page 2 of 57 COMPLAINT 1. Plaintiff Xinuos, Inc. (“Xinuos”), for its Complaint against Defendants International Business Machines Corp. (“IBM”) and Red Hat, Inc. (“Red Hat”) alleges on knowledge as to itself, its own acts and facts known to it and reasonable inferences therefrom, and on information and belief as to all other matters, as follows: 2. This case is simple. IBM and Red Hat conspired to illegally corner a market and crush competition. First, IBM stole Xinuos’ intellectual property and used that stolen property to build and sell a product to compete with Xinuos itself. Second, stolen property in IBM’s hand, IBM and Red Hat illegally agreed to divide the relevant market and use their growing market powers to victimize consumers, innovative competitors, and innovation itself. Third, after IBM and Red Hat launched their conspiracy, IBM then acquired Red Hat to solidify and make permanent their scheme. Fourth, IBM has been misleading its investors by falsely claiming all infringement claims against IBM regarding the copied code have been waived. 3. IBM and Red Hat have engaged in this well-worn, anticompetitive conduct in order to corner the market for operating system software that companies rely on to use servers.
    [Show full text]
  • Einführung in Z/OS Und OS/390
    Einführung in z/OS und OS/390 Dr. rer. nat. Paul Herrmannn Prof. Dr.-Ing. Wilhelm G. Spruth WS 2006/2007 Teil 3 z/OS Betriebssystem es 0101 ww6 wgs 09-99 System z und S/390 Betriebssysteme z/OS IBM große Installationen (OS/390, MVS) z/VSE IBM mittelgroße Installationen z/VM IBM Virtualisierung, Software Entwicklung TPF IBM spezialisierte Transaktionsverarbeitung UTS 4 Amdahl based on System V, Release 4 (SVR4) OSF/1 Hitachi Open System Foundation Unix z/Linux Public Domain Alle System z bzw. S/390 Betriebssysteme sind Server Betriebssysteme, optimiert für den Multi-User Betrieb es 0521z ww6 wgs 09-99 Transaction Processing Facility TPF 13. Oktober 2006. Die Firma Worldspan, ein weltweiter Anbieter von Reise-Reservierungs- systemen, hat sich für den Einsatz von sechs IBM System z9 Enterprise Class (EC) Mainframe-Servern entschieden. Worldspan will damit sein Angebot an elektronischen Datendiensten erweitern, um circa 700 Anbietern von Reiseangeboten und Millionen von Reisenden weltweit eine gemeinsame Plattform anbieten zu können. Worldspan setzt die neuen IBM System z9 EC Server ein, um sowohl Reisebüros als auch Anbietern von Online-basierten Reisediensten die Möglichkeit zur Nutzung des weltweiten Global Distribution System (GDS) zu geben, über das zum Beispiel die Bestellung und Buchung von Reiseprodukten von Flugzeugtickets, Hotels, Mietwagen und andere Reisedienstleistungen durchgeführt wird. Durch die Nutzung der Software „IBM Transaction Processing Facility“ (TPF) ist Worldspan in der Lage, 17.000 Kundenanfragen pro Sekunde auf
    [Show full text]
  • Programming Mac OS X: a GUIDE for UNIX DEVELOPERS
    Programming Mac OS X: A GUIDE FOR UNIX DEVELOPERS KEVIN O’MALLEY MANNING Programming Mac OS X Programming Mac OS X A GUIDE FOR UNIX DEVELOPERS KEVIN O’MALLEY MANNING Greenwich (74° w. long.) For electronic information and ordering of this and other Manning books, go to www.manning.com. The publisher offers discounts on this book when ordered in quantity. For more information, please contact: Special Sales Department Manning Publications Co. 209 Bruce Park Avenue Fax: (203) 661-9018 Greenwich, CT 06830 email: [email protected] ©2003 by Manning Publications Co. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps. Recognizing the importance of preserving what has been written, it is Manning’s policy to have the books they publish printed on acid-free paper, and we exert our best efforts to that end. Manning Publications Co. Copyeditor: Tiffany Taylor 209 Bruce Park Avenue Typesetter: Denis Dalinnik Greenwich, CT 06830 Cover designer: Leslie Haimes ISBN 1-930110-85-5 Printed in the United States of America 12345678910–VHG–05 040302 brief contents PART 1OVERVIEW ............................................................................. 1 1 ■ Welcome to Mac OS X 3 2 ■ Navigating and using Mac OS X 27 PART 2TOOLS ..................................................................................
    [Show full text]
  • Installation and Configuration Guide
    IBM Copy Services Manager Version 6 Release 2 Installation and Configuration Guide IBM SC27-8543-10 Note: Before using this information and the product it supports, read the information in “Notices” on page 59. Edition notice This edition applies to Version 6, Release 2 , Modification 6 of IBM® Copy Services Manager and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2005, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables................................................................................................................... v About this guide...................................................................................................vii Who should read this guide........................................................................................................................vii Conventions used in this guide.................................................................................................................. vii Publications............................................................................................................................................... viii Feedback................................................................................................................................................xi Contacting IBM Software Support ............................................................................................................
    [Show full text]
  • UNIX System Servicesplanning
    z/OS Version 2 Release 3 UNIX System Services Planning IBM GA32-0884-30 Note Before using this information and the product it supports, read the information in “Notices” on page 409. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-03-26 © Copyright International Business Machines Corporation 1996, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures...................................................................................................... xv List of Tables......................................................................................................xvii About this document...........................................................................................xix Using this document..................................................................................................................................xix z/OS information........................................................................................................................................xix Discussion list.......................................................................................................................................xix How to send your comments to IBM.....................................................................xxi If you have a technical problem................................................................................................................xxi
    [Show full text]
  • Enterprise Peopletools 8.50 Installation for DB2 UDB for Z/OS
    Enterprise PeopleTools 8.50 Installation for DB2 UDB for z/OS September 2009 Enterprise PeopleTools 8.50 Installation for DB2 UDB for z/OS SKU ipt850_082809_itdb20S390 Copyright 2009, Oracle and/or its affiliates. All rights reserved. Trademark Notice Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. License Restrictions Warranty/Consequential Damages Disclaimer This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement orallowedbylaw, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. Warranty Disclaimer The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. Restricted Rights Notice If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are “commercial computer software” or “commercial technical data” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]